Share this

Research and Application of Ethernet in Baghouse Dust Collection Systems

2026-04-06 04:48:21 · · #1

Abstract: Through investigation and research on the monitoring section of the existing converter bag filter dust collection system in a steel plant, it was found that the system uses industrial fieldbus for communication, with multiple and inconsistent protocols, such as OPC, Modbus, and Modbus-Modbus Plus. The entire system is divided into seven parts, which are scattered and geographically distant, making effective system analysis and control difficult, resulting in low dust collection efficiency. To address this problem, Schneider Electric's Quantum series PLC and MP7 industrial monitoring software were adopted. Industrial Ethernet was used as the communication channel for field data, and TCP-IP was used as the unified communication protocol for centralized monitoring. Event activation was implemented using a trigger-based approach, thereby reducing system resource utilization and effectively minimizing network-induced latency. Through this system design, dust collection efficiency was improved, flue gas emission concentration was reduced, and atmospheric environmental quality was improved.

Keywords: bag filter; network monitoring; industrial Ethernet; redundancy; latency

0 Introduction

The large amounts of dust generated during steel smelting pose a significant threat to the health of operators and the environment. Baghouse dust collectors are widely used due to their effectiveness in dust control. Although a steel plant in Jinan uses a baghouse dust collector system, the lack of a comprehensive dust collector monitoring system results in fragmented and manual monitoring, leading to low dust collection efficiency, poor real-time system maintenance, heavy workload, and incomplete information. This also results in excessive personnel and wasted resources. Therefore, establishing a high-performance dust collector monitoring system is essential. Traditional methods using high-level languages ​​such as VB or VC++ to develop monitoring systems offer advantages such as low-level development and high flexibility, but also suffer from long development cycles, poor system portability, and limited scalability. To address these shortcomings, this system utilizes MonitorPro V7.2 industrial control configuration software developed by Schneider Electric.

1. Overall System Network Topology

The dust removal network monitoring system for converters in groups 2 and 3 consists of 7 subsystems, including: auxiliary raw material dust removal system; blast furnace dust removal system; secondary dust removal system for converter group 1; first-phase LF dust removal system; hot metal pretreatment dust removal system; secondary dust removal systems for converters 2 and 3; and second-phase LF secondary dust removal system, as shown in Figure 1.

The seven subsystems are located in seven different sites, each consisting of a dust collector motor and dust collector body, a dust removal control system, a dust removal and ash unloading system, and a dust conveying system. The host computer and the field systems utilize a Schneider PLC control system (combining electrical and instrumentation functions) for sequential and continuous control, forming a Level I basic automation system. The Level II process computer consists of two server backup systems, whose main functions include process technology calculation, production guidance, process monitoring, data communication, and production reporting. An HMI (Human-Machine Interface) substation is set up near the site. The substation system communicates with the host computer via 10M/100M industrial Ethernet . Due to the relatively large distance between the field substations, a separate central monitoring room is required. By centralizing the seven subsystems in one monitoring room, data is collected and stored on a fixed server in a real-time SQL Server database. Visual Basic tools are used to automatically generate and print reports, thus automatically and in real-time recording of field operation, faults, curves, and personnel on-duty status.

Triggered by the rising edge of the voltage level, its output only determines the input at the edge moment, thus exhibiting strong anti-interference capability and preventing malfunctions. In this system, due to the complexity of the equipment and varying requirements, different triggering methods must be selected for different operational situations. For example, level triggering is sufficient for some digital quantity toggling operations; while for more critical operations such as starting and stopping equipment, pulse triggering is used to ensure safety and stability.

2. System Function Introduction

2.1 Equipment start-up and shutdown operations

There are three ways to start and stop the equipment: on-site, local, and centralized. Local and centralized operations are all performed using a mouse or keyboard. Centralized computer operation is used for equipment start and stop. Before starting, it's necessary to check if the local control cabinet has granted operating permissions; operation can only proceed if permissions are granted to prevent misoperation. In stand-alone or debugging mode, individual equipment can be operated, including automatic/manual operation selection, equipment start/stop control, and selection of dust cleaning and conveying methods.

2.2 Display and Alarm Prompts

The display section needs to show parameters such as shaft pressure, working oil pressure, vibration intensity, and stator temperature of the dust collector fan; the status of the solenoid valves, material level, and rapping in the dust collector chamber; and the pressure difference in the dust collector chamber. Different colors are used to distinguish the equipment's operating status, and process control parameters are simultaneously displayed in the corresponding positions. Multiple screens are designed to represent different production processes, with the mouse switching between the overall view and details of the process. In case of a fault, an audible and visual alarm is triggered, the alarm bar flashes to indicate the fault, and the fault location, time, and time are recorded in the background database for later review and analysis. After the fault is confirmed, the sound and flashing screen can be manually deactivated, but the screen remains active.

2.3 Parameter History

It records and generates historical curves and reports in real time, and saves data on important process parameters for production debugging, accident analysis, and querying.

2.4 System Security Management

To prevent unauthorized access to the computer and staff from logging out of the system, and to ensure the security of the entire monitoring system, corresponding user levels and passwords are designed for different users. This system employs a user management function with three levels: ordinary users, advanced users, and super users, each with different operating permissions. Users can only operate within the scope of the permissions granted by the super user, thereby enhancing the system's security and reliability.

2.5 Report Printing Function

To monitor production status and reduce operator workload, an automated reporting system was designed. Using Visual Basic, it reads data from a SQL database, automatically generates reports, and prints them. The printing methods include: ① Scheduled printing: Printing T/R operation reports at set intervals; ② User-defined printing: Users can customize the printing of current or historical reports; ③ Alarm printing: When a T/R malfunction occurs, the system automatically records the time of the malfunction, the type of malfunction, and the operating parameters at the time of the malfunction.

3 System Software Design

This system is mainly built on Schneider Electric's MonitorProV7-2 industrial control configuration software. The server end of the software and the lower-level PLC communicate via industrial Ethernet using the TCP/IP protocol, and the client end allows users to operate the system through a convenient human-machine interface.

3.1 Introduction to MonitorPro V7.2

MonitorPro V7.2 is an industrial configuration software developed by Schneider Electric, designed to optimize production management processes. It provides best-in-class technology for information management and processing in various fields—automation, agricultural sectors, water treatment, etc. Its modular design allows for customization to meet application requirements. Its user-friendly interface and flexible structure facilitate tailoring to individual user needs. Users can quickly create their own user interfaces, add remote maintenance capabilities, and perform additional operations.

3.2 Introduction to Industrial Ethernet

Ethernet is a local area network (LAN) introduced by Xerox PLC in 1975. Currently, because the Internet and Industrial Ethernet use the unified communication protocol—TCP/IP—Ethernet boasts advantages such as real-time performance, stability, and versatility. Therefore, it is increasingly used not only in the human-machine interface (HMI) layer and enterprise information system layer, but also in the I/O layer and HMI layer, earning the reputation of being "e-network to the end." Despite possessing the inherent drawbacks of all networks, such as issues with real-time and deterministic communication, robustness, and interference resistance, its advantages and disadvantages are comprehensively considered, leading to its widespread application in industrial settings.

3.3 Display Design for System Monitoring

Although the display part in the monitoring is relatively simple, in order to achieve a concise and clear picture, fewer tags, and easier management and maintenance, similar or identical devices are defined by arrays. Each type of device is replaced by a tag name. Furthermore, instead of defining each of the most numerous digital quantities in the system one by one, the method of defining multiple digital quantities by using each bit of the binary representation of the analog quantity to define the 0 and 1 changes of multiple digital quantities is not adopted, which greatly reduces the tedious tag definition process.

3.4 Design and Implementation of Redundant Servers

The on-site requirements necessitate continuous, fault-free system operation, necessitating a master server and a slave server (standby server) for redundancy. This requires two identical servers, configured to support master/slave arbitration, and synchronized real-time data, database records, and system alarms. On-site clients connect to both servers simultaneously. If either server fails, the system switches to the other within 10ms, ensuring uninterrupted real-time system operation and achieving fault-free, safe operation.

3.5 Solving Induced Delay in Networks

Due to the large number of points in the system, their long distances, and the inherent data latency issues of networks, system instability increases. Currently, common methods include collision fragmentation shielding and latency compensation. Considering that network-induced latency is caused by packet queuing delays, information generation delays, and transmission delays, a triggering method is used to request data transmission to reduce data waiting time, thereby reducing latency.

Generally, transmission uses two triggering methods: level triggering and pulse triggering. Different triggering methods have different advantages and disadvantages: ① Level triggering: Level triggering occurs when the signal becomes high or low, so its anti-interference capability is weak. It also has the advantages of simple structure and fast triggering speed. However, its disadvantage is that it is prone to causing a "ghosting" (or "skipping") effect. ② Pulse triggering: Pulse triggering occurs on the rising edge of the signal becoming high. Its output only determines the input at the edge, so it has strong anti-interference capability and does not cause a "ghosting" effect.

3.6 An Algorithm in Alarm Point Design

In the design of the system fault location and alarm, due to the involvement of valve linkages, a specialized algorithm was designed to ensure normal and accurate alarm operation. Taking the linkage and interlocking relationship between the dust collector's pulse valves and lifting valves as an example, the following explanation is provided: During dust cleaning, the lifting valve of the dust cleaning chamber is first closed, meaning the lifting valve of that chamber is energized. Then, the 12 pulse valves of that chamber are sequentially activated. Compressed air is injected into the filter bags through the pulse valves and blowpipes, causing the filter dust attached to the outside of the filter bags to fall off. After the 12 pulse valves of the dust cleaning chamber have finished blowing, the lifting valve of that chamber is opened, restoring the filtration state. Since the opening/closing of valves is a typical digital 0/1 switching, and there are many valves, based on the method of defining multiple digital quantities using each bit of an analog quantity's binary representation, one lifting valve in one chamber corresponds to 12 pulse valves and 12 nozzles, defined as an analog quantity me. The first to 12 bits of its binary representation represent the states of the 12 pulse valves, respectively.

The alarm rule is as follows: When both the dust collector lift valve and the pulse valve are working normally (i.e., both are displayed in green), the corresponding nozzle in the dust collector will also work normally (displayed in green, 1). If any one of them malfunctions (the dust collector lift valve or any pulse valve), the corresponding nozzle in the dust collector will not work normally (displayed in red, 0). To implement this rule, binary bit manipulation is used. `mc` represents the on/off state of the 12 pulse valves. Therefore, a bitwise AND operation is performed on the state bit of each pulse valve, and then a bitwise AND operation is performed with the state bit of the lift valve. When the lift valve state `ts` and the pulse valve state `me` are both present, the alarm will be triggered. When both are I, nozzle pz The output is 1 for the state; the state of the booster valve ts and the state of the pulse valve mc are also output. If one of the values ​​is not 1, then the nozzle pz The output will be 0 if the state is such that... In this way, the algorithm implements both the alarm rules described above and the interlocking and linkage between the pulse valve and the lift valve. This improves the stability and accuracy of the system and ensures the normal operation of the entire system.

4. System Characteristics

(1) The system’s human-machine interface is designed and developed using MP7 software. The interface is user-friendly, the screen is visually intuitive, and the operation is convenient and flexible.

(2) Using sound and light alarms can promptly notify relevant personnel to reduce or avoid the occurrence and escalation of accidents, and form records for review.

(3) The main process parameters during production are recorded on the hard disk and production reports are generated for analysis and archiving.

(4) The system has good scalability. The newly added processes can also be incorporated into this system. With the selection of appropriate software and hardware resources, the microcomputer network of the general dispatch room can be realized.

5. Conclusion

In summary, through the description of the bag filter and Schneider Electric's MP7 configuration software, we have gained a deeper understanding of the hardware and software configuration and design of the entire system. By using MP7 industrial control configuration software, industrial Ethernet, and the TCP/IP protocol, real-time data transmission between the PLC and the upper-level monitoring system was achieved. This ensured the real-time data required by management and production personnel, reduced data transmission distortion, guaranteed economical operation of the unit, improved productivity, reduced personnel waste, and thus improved factory efficiency.

References:

[1] Xiang Xiaodong. Modern Dust Removal Theory and Technology [M]. Beijing: Metallurgical Industry Press, 2002. 10-60.

[2] Huang Zhifeng. Visual Basic Advanced Programming Examples Explained [M]. Beijing: National Defense Industry Press, 2001. 1-150.

[3] Li Daiping, Zhang Wenchong. SQL Server 2000 Database Application Development. Beijing: Metallurgical Industry Press, 2002, pp. 105-200.

[4] Wang Changli, Luo An. Design and Application Examples of Distributed Control Systems (DCS) [1]. Beijing: Electronic Industry Press, 2004. 11-140.

[5] Li Wei. Ethernet-based IP networking technology [M]. Chengdu: Southwest Jiaotong University Press, 2004. 135-145.

Click to download: Research and Application of Ethernet in Baghouse Dust Collection Systems

Edited by: Chen Dong

Read next

CATDOLL 126CM Laura

Height: 126cm Weight: 23kg Shoulder Width: 32cm Bust/Waist/Hip: 61/58/66cm Oral Depth: 3-5cm Vaginal Depth: 3-15cm Anal...

Articles 2026-02-22